Masakatsu Nishigaki

Orcid: 0000-0001-6048-3495

According to our database1, Masakatsu Nishigaki authored at least 96 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Synthesizing differentially private location traces including co-locations.
Int. J. Inf. Sec., February, 2024

Ensemble Malware Classifier Considering PE Section Information.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Multibiometrics Using a Single Face Image.
CoRR, 2024

ExpressionAuth: Utilizing Avatar Expression Blendshapes for Behavioral Biometrics in VR.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024

DAP PLXENT#x1D107; : Develop pair-Authentication Protocol with DAP.
Proceedings of the Adjunct Proceedings of the 26th International Conference on Mobile Human-Computer Interaction, 2024

MagSerea: Fingerprinting Magnetic Field of Specified Area with Wearable Sensors.
Proceedings of the Adjunct Proceedings of the 26th International Conference on Mobile Human-Computer Interaction, 2024

LabellessFace: Fair Metric Learning for Face Recognition without Attribute Labels.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024

Are Dark Patterns Self-destructive for Service Providers?: Revealing Their Impacts on Usability and User Satisfaction.
Proceedings of the HCI in Business, Government and Organizations, 2024

Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Messages and Incentives to Promote Updating of Software on Smartphones.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Enhancement of a Company-Wide Information Security Management System Through Incident Learning.
SN Comput. Sci., May, 2023

Proposal for Approaches to Updating Software on Android Smartphone.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

Human Factors Impacting the Security Actions of Help Recipients.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

Scheme for Selection of Deceptions as a Countermeasure for Insider Threats.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

2022
Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential.
Proceedings of the Advances in Network-Based Information Systems, 2022

Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

Improving Classification Accuracy by Optimizing Activation Function for Convolutional Neural Network on Homomorphic Encryption.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

Model-Free Template Reconstruction Attack with Feature Converter.
Proceedings of the 21st International Conference of the Biometrics Special Interest Group, 2022

Improving Robustness and Visibility of Adversarial CAPTCHA Using Low-Frequency Perturbation.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers.
Proceedings of the Advances in Networked-Based Information Systems, 2021

Synthesizing Privacy-Preserving Location Traces Including Co-locations.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Examining of Shallow Autoencoder on Black-box Attack against Face Recognition.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

2020
Public-key Searchable Encryption with Index Generation for Shared Database.
J. Inf. Process., 2020

A Liveness Detection Method for Palmprint Authentication.
Proceedings of the Intelligent Human Systems Integration 2020, 2020

Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks.
Proceedings of the Intelligent Human Systems Integration 2020, 2020

Understanding the Impact of Service Trials on Privacy Disclosure.
Proceedings of the HCI International 2020 - Posters - 22nd International Conference, 2020

Attack Intention Estimation Based on Syntax Analysis and Dynamic Analysis for SQL Injection.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Analysis of Malicious Email Detection using Cialdini's Principles.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

Study on Possibility of Estimating Smartphone Inputs from Tap Sounds.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted Email.
Proceedings of the Advanced Information Networking and Applications, 2020

Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical Use.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
On Trust Confusional, Trust Ignorant, and Trust Transitions.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

DiReCT: Disaster Response Coordination with Trusted Volunteers.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019

PDH : Probabilistic Deep Hashing Based on Map Estimation of Hamming Distance.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Analysis of the Relationship Between Psychological Manipulation Techniques and Personality Factors in Targeted Emails.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Efficient Spoofing Attack Detection against Unknown Sample using End-to-End Anomaly Detection.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

Basic Study on Targeted E-mail Attack Method Using OSINT.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Humanics information security.
Concurr. Comput. Pract. Exp., 2018

A Study on Human Reflex-Based Biometric Authentication Using Eye-Head Coordination.
Proceedings of the Advances in Network-Based Information Systems, 2018

Intrusion Detection Method Using Enhanced Whitelist Based on Cooperation of System Development, System Deployment, and Device Development Domains in CPS.
Proceedings of the Advances in Network-Based Information Systems, 2018

Micro Disposable Biometric Authentication: An Application Using Fingernail Minute Textures for Nonsensitive Services.
Proceedings of the 2018 3rd International Conference on Biomedical Imaging, 2018

Automatic Examination-Based Whitelist Generation for XSS Attack Detection.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Ransomware Detection Considering User's Document Editing.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Editor's Message to Special Issue on "Towards Secure Society Considering Things and Human Aspects".
J. Inf. Process., 2017

Signature Schemes with a Fuzzy Private Key.
IACR Cryptol. ePrint Arch., 2017

Social Innovation Based on the Business Process Perspective: A Case Study of an Unattended Movable Store.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Slyware Prevention: Threat of Websites Inducing Accidental Taps and Countermeasures.
Proceedings of the Advances in Network-Based Information Systems, 2017

A Secure and Practical Signature Scheme for Blockchain Based on Biometrics.
Proceedings of the Information Security Practice and Experience, 2017

Directcha-maze: A Study of CAPTCHA Configuration with Machine Learning and Brute-Force Attack Defensibility Along with User Convenience Consideration.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

2016
Study on relationship between user awareness and QoE in communication delay on smartphones.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Directcha: A proposal of spatiometric mental rotation CAPTCHA.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A Micro Biometric Authentication Mechanism Considering Minute Patterns of the Human Body: A Proposal and the First Attempt.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Implementation and Initial Evaluation of Game in Which Password Enhancement Factor is Embedded.
Proceedings of the HCI International 2016 - Posters' Extended Abstracts, 2016

2015
Physical trust-based persistent authentication.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

An Attempt to Memorize Strong Passwords while Playing Games.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

UE-based network access timing control scheme for avoiding signaling spikes.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Chimera CAPTCHA: A Proposal of CAPTCHA Using Strangeness in Merged Objects.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

A Signature Scheme with a Fuzzy Private Key.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
i/k-Contact: A context-aware user authentication using physical social trust.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

An Image-Based CAPTCHA Using Sophisticated Mental Rotation.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
A Proposal for the Deterrence of Information Leakage Using Anti-virus Software.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

SanAdBox: Sandboxing third party advertising libraries in a mobile application.
Proceedings of IEEE International Conference on Communications, 2013

Gamified CAPTCHA.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

2012
A Proposal to Realize the Provision of Secure Android Applications - ADMS: An Application Development and Management System.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Design Method of Derivative State Constrained H 2 Integral Servo Controller for Suppressing under Damping of Oscillatory System.
Proceedings of the AsiaSim 2012, 2012

2011
Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists.
J. Inf. Process., 2011

A Keystroke Logger Detection Using Keyboard-Input-Related API Monitoring.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

A Study on a Practical Measure against Billing Frauds.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

A Proposal of Four-Panel Cartoon CAPTCHA.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Privacy-preserving similarity evaluation and application to remote biometrics authentication.
Soft Comput., 2010

A Proposal of Four-Panel Cartoon CAPTCHA: The Concept.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

Study of Garment-Wearing Detecting System Using Intra-Body Communication Technology.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

A Security Measure Selection Scheme with Consideration of Potential Lawsuits.
Proceedings of the 2010 International Conference on Security & Management, 2010

CAPTCHA Using Strangeness in Machine Translation.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
IP Traceback Using DNS Logs against Bots.
J. Inf. Process., 2009

A Proposal of Efficient Remote Biometric Authentication Protocol.
Proceedings of the Advances in Information and Computer Security, 2009

Host-based traceback; tracking bot and C&C server.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection.
Proceedings of the 2009 International Conference on Security & Management, 2009

Advantages of User Authentication Using Unclear Images.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Making Use of Human Visual Capability to Improve Information Security.
Proceedings of the The Forth International Conference on Availability, 2009

2008
A user authentication based on human reflexes using blind spot and saccade response.
Int. J. Biom., 2008

Detection of Bot Infected PCs Using Destination-Based IP and Domain Whitelists During a Non-Operating Term.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Physical Access Control with Biometric Keys.
Proceedings of the 2008 International Conference on Security & Management, 2008

Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story".
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue.
Proceedings of the 2007 International Conference on Security & Management, 2007

A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value.
Proceedings of the 2007 International Conference on Security & Management, 2007

ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol.
Proceedings of the The Second International Conference on Availability, 2007

2006
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints.
Proceedings of the 2006 International Conference on Security & Management, 2006

A User Authentication System Using Schema of Visual Memory.
Proceedings of the Biologically Inspired Approaches to Advanced Information Technology, 2006

2003
A fault-tolerant combinational circuit with fault diagnosis capability - To mask and detect the loss of any one connection between gate circuits.
Syst. Comput. Jpn., 2003

1994
Mixed Mode Circuit Simulator SPLIT2.1 using Dynamic Network Separation and Selective Trace.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994

Iterated Timing Analysis with Dynamic Partitioning Technique for Bipolar Transistor Circuits.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994


  Loading...